Advanced Search

2013 Vol. 35, No. 11

Display Method:
Articles
Downlink/uplink Configuration Identification of TD-LTE Primary Systems in Cognitive Radios
Rao Yu, Chen Wei, Cao Zhi-Gang
2013, 35(11): 2541-2546. doi: 10.3724/SP.J.1146.2013.00188
Abstract:
When the cognitive radios are coexisting with time division duplex systems, it should firstly find out the link directions of the primary systems for the separate design and implementation of the followed spectrum sensing and access. However, in the ...
Layered Video Multicast Considering Source-coding Characteristic in Broadband Wireless Networks
Sun Wen-Zhu, Wang Hong-Yu, Wang Jie, Tang Zhen-Zhou
2013, 35(11): 2547-2553. doi: 10.3724/SP.J.1146.2013.00359
Abstract:
A layered video multicast scheme for broadband wireless networks is proposed. The multicast scheme works by combining layered video coding with Adaptive Modulation and Coding (AMC). The system utility is formulated into a function of user distributio...
Compressed Image Transmission Based on Systematic Raptor Codes with Unequal Error Protection
Liu Guo, Yu Wen-Hui, Wu Jia-Ji, Bai Bao-Ming
2013, 35(11): 2554-2559. doi: 10.3724/SP.J.1146.2012.01362
Abstract:
A scheme for image transmission over wireless channel is proposed. Being rateless, fountain codes could reduce system complexity and no feedback channel is needed. Traditional fountain code has a low decoding efficiency, and the quality of the recove...
Analysis of Observation Time for Broadband-based Energy Detection with Performance Constraints and Noise Uncertainty
Yuan Long, Liu Zi-Yang, Peng Tao, Wang Wen-Bo
2013, 35(11): 2560-2565. doi: 10.3724/SP.J.1146.2012.01718
Abstract:
This paper discusses about the trade-off between detection probability, false alarm probability and observation period for the broadband spectrum energy detection. By utilizing the threshold based on the minimum-error-rate criterion, the closed-form ...
Analysis and Optimization of Censor-based Cooperative Spectrum Sensing
Luan Hong-Zhi, Li Ou
2013, 35(11): 2566-2571. doi: 10.3724/SP.J.1146.2012.01702
Abstract:
Energy consumption is an important consideration in Cooperative Spectrum Sensing (CSS). In order to reduce the data reporting energy and thus prolong the lifetime of Secondary User (SU) with energy constraint in Cognitive Radio Network (CRN), a novel...
Average Magnitude Based Weighted Bit-flippingDecoding Algorithm for LDPC Codes
Zhang Gao-Yuan, Zhou Liang, Su Wei-Wei, Wen Hong
2013, 35(11): 2572-2578. doi: 10.3724/SP.J.1146.2012.01728
Abstract:
Considering the Weighted Bit Flipping (WBF) and Modified Weighted Bit Flipping (MWBF) decoding algorithms for Low Density Parity-Check (LDPC) codes, a modified algorithm is proposed in this paper. Based on Average Magnitude (AM), a more simple and ef...
The Distribution of Homogeneous Distance of (1+u)-constacyclic Codes over Fpm+uFpm++uk-1Fpm
Zhu Shi-Xin, Huang Su-Juan
2013, 35(11): 2579-2583. doi: 10.3724/SP.J.1146.2013.00274
Abstract:
In this paper, the distribution of homogeneous distance of (1+u)-constacyclic codes over the ring Rk=Fpm+uFpm++uk-1Fpmof arbitrary lengths is studied. Firstly, the torsion codes of a (1+u)-constacyclic code overRk for a given length are introduced. T...
Capacity of a Class of Semi-deterministic Relay Channel with Orthogonal Components and Channel State
Deng Zhi-Xiang, Wang Bao-Yun, Lang Fei
2013, 35(11): 2584-2589. doi: 10.3724/SP.J.1146.2013.00234
Abstract:
A class of state-dependent relay channel with orthogonal channels from the source to the relay and from the source and the relay to the destination is studied. The two orthogonal channels are corrupted by a common channel state which is known to both...
Performance Analysis of Spectrum Handoff in Cognitive Radio Networks
Wu Cheng-Yu, He Chen, Jiang Ling-Ge
2013, 35(11): 2590-2595. doi: 10.3724/SP.J.1146.2012.01353
Abstract:
In cognitive radio networks, the spectrum handoff performance of secondary users not only relates closely to the communication behavior of primary users, but also related closely to the spectrum sensing accuracy and the spectrum handoff strategies of...
Multi-parameters Link Failure Localization Algorithm Based on Compressive Sensing
Wang Ru-Yan, Wu Qing, Xiong Yu, Xie Yu, Zhao Ying
2013, 35(11): 2596-2601. doi: 10.3724/SP.J.1146.2013.00265
Abstract:
To improve the performance and decrease the constraints of fault localization with single distinguish parameter, a multi-parameters link failure localization algorithm is proposed based on compressive sensing and entropy difference. Firstly it makes ...
Autocorrelation of the Two-prime Sidelnikov Sequence
Yue Zhao, Gao Jun-Tao, Xie Jia
2013, 35(11): 2602-2607. doi: 10.3724/SP.J.1146.2013.00147
Abstract:
Brandsttter et al. (2011) combined the concepts of the two-prime generator and Sidelnikov sequence to define a new sequence called two-prime (p, q) Sidelnikov sequence, and analyzed the balance, the autocorrelation, the correlation measure and the li...
Attack Composition Model Based on Generalized Stochastic Colored Petri Nets
Gao Xiang, Zhu Yue-Fei, Liu Sheng-Li
2013, 35(11): 2608-2614. doi: 10.3724/SP.J.1146.2013.00090
Abstract:
Attack modeling plays an important role in network security analysis and assessment. A Generalized Stochastic Colored Petri Net (GSCPN) model for attack composition is proposed. To each attack, a GSCPN model is constructed to describe the relation of...
An Authentication Scheme Using Hierarchical Identity Based Signature in Large-scale Delay Tolerant Networks
Xu Guo-Yu, Chen Xing-Yuan, Du Xue-Hui
2013, 35(11): 2615-2622. doi: 10.3724/SP.J.1146.2012.01735
Abstract:
The existing authentication schemes have the problem of heave calculation and communication overhead in the large-scale delay tolerant network. This paper proposes an authentication scheme for large-scale delay tolerant networks. An efficient hierarc...
Multiparty-to-multiparty Quantum Secret Sharing Based on Dense-coding
Du Yu-Tao, Bao Wan-Su, Guan Wen-Qiang, Zhou Chun, Fu Xiang-Qun
2013, 35(11): 2623-2629. doi: 10.3724/SP.J.1146.2013.00164
Abstract:
To solve the problem of secret sharing between multiparty and multiparty, a new multiparty-to- multiparty quantum secret sharing protocol is proposed based on dense-coding. It performs different local operations on different photons of the Bell state...
Quantitative Evaluation Approach for Real-time Risk Based on Attack Event Correlating
Ge Hai-Hui, Xiao Da, Chen Tian-Ping, Yang Yi-Xian
2013, 35(11): 2630-2636. doi: 10.3724/SP.J.1146.2012.01539
Abstract:

The alarms of Intrusion Detective System (IDS) are correlated and analyzed dynamically in a certain interval of time according to the relevant characteristics of real-time alarms. On this basis, a quantitative evaluation approach for real time risk i...

A Voter Model Supporting Intrusion-tolerance for Network Distance Estimation
Wang Cong, Zhang Feng-Li, Yang Xiao-Xiang, Li Min, Wang Rui-Jin
2013, 35(11): 2637-2643. doi: 10.3724/SP.J.1146.2012.01402
Abstract:
To enhance the survivability of Network Coordinate System (NCS) in un-trusted environment, the physical meaning of anchor nodes spring force in classic model is re-explained, weight vector is taken for anchor nodes reputations instead of their predic...
Less Stringent Reliable Virtual Network MappingAlgorithm for Substrate Single Node Failure
Liu Guang-Yuan, Su Sen
2013, 35(11): 2644-2649. doi: 10.3724/SP.J.1146.2013.00254
Abstract:
Network reliability is one of the most important performance in the design of Virtual Network (VN) and gaining more and more attention currently. This paper focuses on the issue of less stringent reliable virtual network mapping. The VN topology rema...
A Data-rate Control Model Based on 802.11 DCF Basic Access Mechanisms in Mobile Ad hoc Networks
Xia Wen-Jie, Li Qian-Mu, Sun Jin-Hou, Liu Feng-Yu
2013, 35(11): 2650-2656. doi: 10.3724/SP.J.1146.2012.01623
Abstract:
Mobile Ad hoc NETworks (MANET) has inherent characteristic of dynamic topology, distributed collaboration, thus on-demand routing protocols employs multicast mechanism to improve transmission efficiency. However multicast is apt to cause network cong...
Adaptive Filter Based on the Cooptimized Transmit-receiver in Clutter
Wu Xu-Zi, Liu Zheng, Liu Yun-Fu
2013, 35(11): 2657-2663. doi: 10.3724/SP.J.1146.2013.00134
Abstract:
To improve the amplitude estimation accuracy of the fluctuating targets in clutter, an adaptive filter based on the cooptimized transmit-receiver with minimum Mean Square Error (MSE) criteria is proposed. The approach is performed in three stages. Fi...
Enhanced Compressive Imaging Approach Based on Multi-measurement and Dynamic Clustering
Wang Peng-Yu, Song Qian, Zhou Zhi-Min
2013, 35(11): 2664-2671. doi: 10.3724/SP.J.1146.2012.01582
Abstract:
In noisy environments, signal reconstruction can be converted into the issue of bound constrained quadratic programming which can be resolved by the regularization programming algorithm, but the reconstruction quality depends heavily on the regulariz...
MIMO Array Design for Airborne Linear Array 3D SAR Imaging
Wu Zi-Bin, Zhu Yu-Tao, Su Yi, Li Yu, Song Xiao-Ji
2013, 35(11): 2672-2677. doi: 10.3724/SP.J.1146.2013.00377
Abstract:
Airborne linear array 3D SAR imaging technique is a research focus in the field of radar imaging, and has broad applications in military and civilian. It utilizes a linear antenna array on the wings to obtain an expected resolution in cross track dir...
Yamaguchi Decomposition Based on Hierarchical Nonnegative Eigenvalue Restriction
Liu Gao-Feng, Li Ming, Wang Ya-Jun, Zhang Peng, Wu Yan
2013, 35(11): 2678-2685. doi: 10.3724/SP.J.1146.2012.01381
Abstract:
To solve the issue that coherency matrices of the existing Yamaguchi decompositions do not satisfy Nonnegative Eigenvalue Restriction (NER), Yamaguchi decomposition based on hierarchical NER is proposed. It is derived that the NER problem results fro...
The Clutter Suppression Based on Factor Analysis and Image Contrast in Through-the-wall Application
Zhang Lan-Zi, Lu Bi-Ying, Zhou Zhi-Min, Sun Xin
2013, 35(11): 2686-2692. doi: 10.3724/SP.J.1146.2013.00063
Abstract:
In Through-the Wall Imaging (TWI), the clutter, because of its great energy, has great effect on the detection of the targets. For the purpose of clutter suppression, Factor Analysis (FA) method is applied to TWI data. Besides, a new evaluation crite...
Study on Space-time Character of Clutter for Forward-looking Frequency Diverse Array Radar
Hu Bai-Lin, Liao Gui-Sheng, Xu Jing-Wei, Zhu Sheng-Qi, Gong Ji-Ling
2013, 35(11): 2693-2699. doi: 10.3724/SP.J.1146.2013.00077
Abstract:
For the Forward-Looking (FL) radar using a linear Frequency Diverse Array (FDA), this paper ,based on the space-time signal model, particularly studies features of clutter space-time spectrum spread and phase range walk. The feature of clutter spectr...
A Probability Hypothesis Density Filter and Data Association Based Algorithm for Multitarget Tracking with Pulse Doppler Radar
Tan Shun-Cheng, Wang Guo-Hong, Wang Na, He You
2013, 35(11): 2700-2706. doi: 10.3724/SP.J.1146.2013.00106
Abstract:
To solve the problem of multitarget tracking with the Pulse Doppler (PD) radar in clutters, a novel method based on Probability Hypothesis Density Filter (PHDF) and Data Association (DA) for joint range ambiguity resolving and multitarget tracking wi...
Transmit Beampattern Design for Planar Array MIMO Radar
Luo Tao, Guan Yong-Feng, Liu Hong-Wei, Jiu Bo, Wu Meng
2013, 35(11): 2707-2713. doi: 10.3724/SP.J.1146.2013.00568
Abstract:
The transmit beampattern methods available for the MIMO radar can not be extended into the planer array MIMO radar. With the application of the base-beam and probability selecting methods, an approach to design the transmit beampattern for the planer...
Space Time Adaptive Parameter Estimation of Moving Target Based on Compressed Sensing
Jia Qiong-Qiong, Wu Ren-Biao
2013, 35(11): 2714-2720. doi: 10.3724/SP.J.1146.2013.00045
Abstract:
In this paper, by exploiting the intrinsic sparsity of the moving target in the angle-Doppler domain, a new space time adaptive moving target parameter estimation algorithm is proposed, which uses the technique of sparse recovery to estimate space-ti...
Characteristics of Surface NRCS and the Effect on theSpaceborne Precipitation Radar System Design
Yang Run-Feng, Yu Yong, Li Liang-Hai, Yang Zhi-Yong
2013, 35(11): 2721-2727. doi: 10.3724/SP.J.1146.2012.01366
Abstract:
The analysis on the statistical characteristics of the surface Normalized Radar Cross Section (NRCS) is the foundation of the Spaceborne Precipitation Radar (SPR) system design, but it is very difficult and costly to measure the global NRCS in long t...
Fusion of Extreme Learning Machines
Zhang Wen-Bo, Ji Hong-Bing
2013, 35(11): 2728-2732. doi: 10.3724/SP.J.1146.2013.00251
Abstract:
In order to improve the classification performance of Extreme Learning Machine (ELM) and retain its advantage of the training speed, after a detailed analysis of feature level fusion and decision level fusion, fusion of ELM is proposed. To implement ...
A Sparse Recovery Algorithm Based on Particle Swarm Optimization
Liu Lu-Feng, Du Xin-Peng, Cheng Li-Zhi
2013, 35(11): 2733-2738. doi: 10.3724/SP.J.1146.2012.01397
Abstract:
Sparse recovery is a hot topic around the areas of international mathematics and information processing at present, and it is mainly solved by two major strategies including convex relaxation methods and greedy pursuit methods. However, considering t...
Camera Response Model Based Moving Detection under Auto Exposure
Jiang Deng-Biao, Li Bo, Chen Qi-Mei
2013, 35(11): 2739-2743. doi: 10.3724/SP.J.1146.2013.00917
Abstract:
To deal with the problem of the dynamic change of the background caused by camera automatic exposure, a camera response model based moving detection algorithm is proposed in the paper. In the initialization stage, through design of energy function ba...
Neural Network Non-uniformity Correction for Infrared Focal Plane Array Based on Perona Malik Diffusion
Yang Shuo, Zhao Bao-Jun, Mao Er-Ke, Tang Lin-Bo
2013, 35(11): 2744-2750. doi: 10.3724/SP.J.1146.2012.01051
Abstract:
A new Neural Network Non-Uniformity Correction (PM-NN-NUC) algorithm is proposed for InfraRed Focal Plane Array (IRFPA) based on Perona Malik (PM) diffusion for the situation of degradation model both containing fix pattern noise and Gaussian noise i...
A Keypoint Matching Method Based on Hierarchical Learning
Gao Hong-Bo, Wang Hong-Yu, Liu Xiao-Kai
2013, 35(11): 2751-2757. doi: 10.3724/SP.J.1146.2013.00347
Abstract:
Keypoint matching is an important task of computer vision and the major problem is to find a fast and robust keypoints algorithm. This paper presents a binary descriptor matching algorithm based on hierarchical learning method. The descriptor learnin...
Robust Adaptive Beamforming Based on Beamspace Steering Vector Estimation
Yang Tao, Su Tao, He Xue-Hui
2013, 35(11): 2758-2763. doi: 10.3724/SP.J.1146.2012.01334
Abstract:
In order to solve the problem of performance degradation due to the imprecise knowledge of the array steering vector and inaccurate estimation of the sample covariance matrix. A new approach based on beamspace steering vector estimation for robust ad...
Robust Adaptive Beamforming with Null Widening
Fan Zhan, Liang Guo-Long, Wang Yi-Lin
2013, 35(11): 2764-2770. doi: 10.3724/SP.J.1146.2013.00087
Abstract:
Adaptive beamformers are sensitive to model mismatch and moving interference, especially when the desired signal is present in training snapshots, even a small error can lead to a serious degradation in performance. A robust adaptive beamforming algo...
Preprocessed Fractional Lower-order Covariance Time Delay Estimation under Symmetric-stable Conditions
Tian Yao, Zhang Li
2013, 35(11): 2771-2777. doi: 10.3724/SP.J.1146.2012.01554
Abstract:
This paper proposes a category of preprocessing functions and the conditions they should meet as to the problems that the type of traditional preprocessing functions is limited and the analysis for the performance improvement caused by the functions ...
Research on Adaptive Quantum Forward Counter Propagation Algorithm
Li Nan, Hou Xuan
2013, 35(11): 2778-2783. doi: 10.3724/SP.J.1146.2013.00101
Abstract:
This paper studies the quantum theory and the principle of Quantum Neural Network (QNN). Model of Quantum Forward Counter Propagation Neural Network (QFCPNN) and Recursive?Weighted Least Squares Quantum Forward Counter Propagation Algorithm (RWLS_QFC...
Leakage Current Optimization for FPGA Switch Matrixes Based on Routing Architecture
Wang Yi, Yang Hai-Gang, Yu Le, Sun Jia-Bin
2013, 35(11): 2784-2789. doi: 10.3724/SP.J.1146.2013.00242
Abstract:
From the perspective of routing architecture, a leakage reduction method of switch matrixes in FPGA is proposed. Based on the conclusion of state-dependent leakage, the lowest leakage current of switch matrixes in FPGA is equivalently computed in a s...
Discussions
Discussion about the Existence Condition of Signal Fourier Transform
Wang Dao-Xian, Duan Xiao-Hui, Yang Guang-Lin
2013, 35(11): 2790-2794. doi: 10.3724/SP.J.1146.2013.00223
Abstract:
For any given signal, determining the existence of its Fourier transform has remained an unsolved problem. This raises many concerns in the teaching of signal analysis courses, and also in many engineering applications. This paper presents an analysi...